Archives - Phishing Attack


Don’t overshare on social media

Love sharing selfies and life updates on social media? Too much info can be a security risk. Think of it like leaving your house keys on the porch – anyone could grab them. Why the caution? Malicious folks can use those juicy details you post to: So, how to stay safe without being a social […]

Stay informed about phishing tactics

While phishing attacks remain a prevalent threat, staying informed on the latest attack evolutions can help to safeguard your devices. As general rules: Beyond these practices, consider taking some time to read more extensively on phishing attacks and put into practice safety measures accordingly.

Conduct regular phishing awareness training

Phishing is one of the most common cyber threats, with the number of phishing-related daily emails reaching millions. Speaking to business owners and managers, consider implementing routine phishing awareness training for employees, focusing on simulated phishing exercises to let employees know how to recognize and report phishing attempts. Given that employees are common targets for […]

Chrome’s phishing extensions help guard against scams

Phishing is a type of online scam designed to get you to reveal personal information such as credit card numbers and passwords. Chrome’s PhishDetector detects phishing attacks on online banking websites. Similarly, PhishTector identifies phishing emails in Gmail.

Phishing scams can come from anywhere

While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with […]

Teach yourself to recognize phishing scams

Phishing scams often look like legitimate requests for information, but there are lots of ways you can spot a phishing attack. Suspicious sender addresses, unsolicited attachments and spelling and grammar mistakes are all signs that a request for information is not legitimate.